summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Fix pvk format processing in libcryptoinoguchi2019-07-071-11/+11
* snprintf/vsnprintf return < 0 on error, rather than -1.deraadt2019-07-032-5/+5
* Add cpuid support for arm64 so that we can recognize whichpatrick2019-07-023-3/+57
* failed to detect asprintf() error by observing return of -1, instead thederaadt2019-06-281-6/+3
* Make BN_num_bits_word() constant time.tb2019-06-171-48/+18
* Improve pages that briefly mentioned ERR - usually below SEE ALSO -schwarze2019-06-1420-124/+198
* Further improve the documentation of library initialization and configuration.schwarze2019-06-146-57/+89
* delete references to ERR pages from SEE ALSO where suchschwarze2019-06-1035-115/+79
* add links back to crypto(3) to function group entry pagesschwarze2019-06-1022-45/+70
* Delete the display of the RSA_METHOD objectschwarze2019-06-081-70/+1
* In rsa.h rev. 1.40, gilles@ provided several new RSA_METHOD accessors.schwarze2019-06-085-46/+499
* document the RSA_FLAG_* constants for RSA_*_flags(3);schwarze2019-06-081-3/+76
* Remove the last references to the RAND_*(3) functions.schwarze2019-06-0712-47/+34
* link to EVP_EncodeInit(3), which was the only missing child pageschwarze2019-06-071-1/+6
* link back to evp(3), just like for the other group entry pagesschwarze2019-06-071-2/+3
* Remove pointless direct backlinks from the leaf pages HMAC(3) andschwarze2019-06-072-6/+4
* remove cross-references to the obsolete function OpenSSL_add_all_algorithms(3)schwarze2019-06-073-21/+7
* minor errors in previous commit pointed out by jmc@schwarze2019-06-064-8/+8
* Tree structure for manual pages: crypto(3) links to 33 functionschwarze2019-06-06117-281/+539
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-054-3/+244
* Fix bogus cross reference: EVP_SignDigest* -> EVP_DigestSign*tb2019-06-051-3/+3
* OPENSSL_realloc(3) is no longer used, we now use reallocarray(3)schwarze2019-06-041-3/+3
* Readability tweak in a comment.tb2019-06-041-2/+2
* Remove the blinding later to avoid leaking information on the lengthtb2019-06-041-3/+3
* Readability tweaks for comments that explain the blinding.tb2019-06-041-5/+5
* Remove the blinding later to avoid leaking information on the lengthtb2019-06-041-3/+3
* .In openssl/x509_vfy.hschwarze2019-06-041-3/+4
* Add several missing .In linesschwarze2019-06-041-3/+13
* add missing .In linesschwarze2019-06-032-4/+6
* add missing .In lineschwarze2019-06-031-2/+3
* bump to LibreSSL 3.0.0bcook2019-05-231-3/+3
* add stdlib.h for reallocarraybcook2019-05-231-1/+2
* *an* RSA;jmc2019-05-201-3/+3
* Correct missing test to determine if length is in bytes or in bits.beck2019-05-141-1/+3
* Fix signed overflow in X509_CRL_print().tb2019-05-121-1/+4
* Revert the other hunk of r1.36 as well: in the case of CCM, ccm.key istb2019-05-121-1/+11
* Stop the eyebleed in here and just use callocbeck2019-05-121-31/+8
* $OpenBSD$tb2019-05-114-0/+4
* Remove commented out rc5 bitstb2019-05-117-20/+6
* Initialize EC_KEY_METHOD before use.bcook2019-05-101-2/+2
* Revert part of r1.36: in the case of GCM, gcm.key is assigned fromtb2019-05-101-1/+7
* Fix incorrect carry operation in 512 bit addition: in the casetb2019-05-091-6/+8
* initialize safestack pointersbcook2019-05-083-6/+6
* Make sure that the tag buffer size is equal to the tag sizetb2019-05-081-2/+2
* Avoid an undefined shift in ASN1_ENUMERATED_get().tb2019-04-281-4/+9
* Avoid an undefined shift in ASN1_INTEGER_get().tb2019-04-281-4/+8
* Add error checking to i2v_POLICY_MAPPINGS().tb2019-04-221-9/+26
* Add error checking to i2v_POLICY_CONSTRAINTS().tb2019-04-221-5/+19
* Add error checking to i2v_EXTENDED_KEY_USAGE().tb2019-04-221-8/+23
* Add error checking to i2v_ASN1_BIT_STRING().tb2019-04-221-4/+18